AJSEC | Advanced Junos Security | Training Course | Juniper. Skip to main Content

Advanced Junos Security

  • Course Code AJSEC
  • Duration 4 days
  • Version 20.1

Additional Payment Options

  • GTC 43 inc. VAT

    GTC, Global Knowledge Training Credit, please contact Global Knowledge for more details

Public Classroom Price


excl. VAT

Request Group Training Add to Cart

Course Delivery

This course is available in the following formats:

  • Company Event

    Event at company

  • Public Classroom

    Traditional Classroom Learning

  • Virtual Learning

    Learning that is virtual

Request this course in a different delivery format.

Course Overview


This four-day course, which is designed to build off the current Juniper Security (JSEC) offering, delves deeper into Junos security, next-generation security features, and ATP supporting software.

Through demonstrations and hands-on labs, you will gain experience in configuring and monitoring the advanced Junos OS security features with advanced coverage of advanced logging and reporting, next generation Layer 2 security, next generation advanced anti-malware with Juniper ATP On-Prem and SecIntel. This course uses Juniper Networks SRX Series Services Gateways for the hands-on component.

This course is based on Junos OS Release 20.1R1.11, Junos Space Security Director 19.4, Juniper ATP On-Prem version 5.0.7.

Course Schedule


Target Audience


Individuals responsible for implementing, monitoring, and troubleshooting Juniper security components.

Course Objectives


After you complete this course you will be able to:

  • Demonstrate understanding of concepts covered in the prerequisite Juniper Security courses
  • Describe the various forms of security supported by the Junos OS
  • Describe the Juniper Connected Security model
  • Describe Junos security handling at Layer 2 versus Layer 3
  • Implement next generation Layer 2 security features
  • Demonstrate understanding of Logical Systems (LSYS)
  • Demonstrate understanding of Tenant Systems (TSYS)
  • Implement virtual routing instances in a security setting
  • Describe and configure route sharing between routing instances using logical tunnel interfaces
  • Describe and discuss Juniper ATP and its function in the network
  • Describe and implement Juniper Connected Security with Policy Enforcer in a network
  • Describe firewall filters use on a security device
  • Implement firewall filters to route traffic
  • Explain how to troubleshoot zone problems
  • Describe the tools available to troubleshoot SRX Series devices
  • Describe and implement IPsec VPN in a hub-and-spoke model
  • Describe the PKI infrastructure
  • Implement certificates to build an ADVPN network
  • Describe using NAT, CoS and routing protocols over IPsec VPNs
  • Implement NAT and routing protocols over an IPsec VPN
  • Describe the logs and troubleshooting methodologies to fix IPsec VPNs
  • Implement working IPsec VPNs when given configuration that are broken
  • Describe Incident Reporting with Juniper ATP On-Prem device
  • Configure mitigation response to prevent spread of malware
  • Explain SecIntel uses and when to use them
  • Describe the systems that work with SecIntel
  • Describe and implement advanced NAT options on the SRX Series devices
  • Explain DNS doctoring and when to use it
  • Describe NAT troubleshooting logs and techniques

Course Content


Course Introduction

Junos Layer 2 Packet Handling and Security Features

  • Transparent Mode Security
  • Secure Wire
  • Layer 2 Next Generation Ethernet Switching
  • MACsec
  • Lab: Implementing Layer 2 Security

Firewall Filters

  • Using Firewall Filters to Troubleshoot
  • Routing Instances
  • Filter-Based Forwarding
  • Lab: Implementing Firewall Filters

Troubleshooting Zones and Policies

  • General Troubleshooting for Junos Devices
  • Troubleshooting Tools
  • Troubleshooting Zones and Policies
  • Zone and Policy Case Studies
  • Lab: Troubleshooting Zones and Policies

Hub-and-Spoke VPN

  • Overview
  • Configuration and Monitoring
  • Lab: Implementing Hub-and-Spoke VPNs

Advanced NAT

  • Configuring Persistent NAT
  • Demonstrate DNS Doctoring
  • Configure IPv6 NAT Operations
  • Troubleshooting NAT
  • Lab: Implementing Advanced NAT Features

Logical and Tenant Systems

  • Overview
  • Administrative Roles
  • Differences Between LSYS and TSYS
  • Configuring LSYS
  • Configuring TSYS
  • Lab: Implementing TSYS


  • PKI Overview
  • PKI Configuration
  • ADVPN Overview
  • ADVPN Configuration and Monitoring
  • Lab: Implementing ADVPNs

Advanced IPsec

  • NAT with IPsec
  • Class of Service with IPsec
  • Best Practices
  • Routing OSPF over VPNs
  • Lab: Implementing Advanced IPsec Solutions

Troubleshooting IPsec

  • IPsec Troubleshooting Overview
  • Troubleshooting IKE Phase 1 and 2
  • IPsec Logging
  • IPsec Case Studies
  • Lab: Troubleshooting IPsec

Juniper Connected Security

  • Security Models
  • Enforcement on Every Network Device


  • Security Feed
  • Encrypted Traffic Analysis
  • Use Cases for SecIntel
  • Lab: Implementing SecIntel

Advanced Juniper ATP On-Prem

  • Collectors
  • Private Mode
  • Incident Response
  • Deployment Models
  • Lab: Implementing Advanced ATP On-Prem

Automated Threat Mitigation

  • Identify and Mitigate Malware Threats
  • Automate Security Mitigation
  • Lab: Identifying and Mitigating Threats

Appendix A: Group VPNs

  • Overview
  • Implementing Group VPNs

Course Prerequisites


Attendees should meet the following prerequisites:

  • Strong level of TCP/IP networking and security knowledge
  • Juniper Security (JSEC)
Recommended prerequisites: